Be - Computer Engineering - Semester 5 - 2022 - May - Computer Network and Security Cns Pattern 2019
Be - Computer Engineering - Semester 5 - 2022 - May - Computer Network and Security Cns Pattern 2019
8
23
P808 [Total No. of Pages : 3
ic-
[5870] - 1128
tat
T.E. (Computer)
6s
COMPUTER NETWORK AND SECURITY
1:5
(2019 Pattern) (Semester - I) (310244)
02 91
8:5
Time : 2½ Hours] [Max. Marks : 70
0
20
1/0 13
Instructions to the candidates:
1) Attempt Q1, or Q.2, Q.3 or Q.4, Q.5or Q.6, Q.7 or Q.8.
0
2) Neat diagrams must be drawn wherver necessary.
7/2
.23 GP
8
C
23
ic-
16
tat
8.2
6s
b) A host was given the 192. 168.2.64 /25 IP address, indicate: [6]
.24
1:5
i) Net mask of the network in dotted decimal notation.
91
49
8:5
ii) The network address to which the host belongs.
30
OR
CE
82
8
23
.23
b) Suppose a router has built up the routing table as shown in the following
table. The router can deliver packets directly over interfaces eth0 and ic-
16
tat
eth1, or it can forward packets to other routers in the table. [6]
8.2
6s
1:5
91
8:5
30
Describe what the router does with a packet addressed to each of the
CE
82
following destinations
.23
i) 156.26.10.66
16
ii) 156.26.10.226
8.2
iii) 168.130.12.27
.24
[5870] - 1128 1
P.T.O.
Q3) a) For each of the following applications, determine whether TCP or UDP
8
23
is used as the transport layer protocol and justify the reason(s) for your
ic-
choice. [5]
tat
i) File Transfer
6s
ii) Watching a real time streamed video
1:5
02 91
iii) Web browsing
8:5
iv) A Voice over IP (VoIP) telephone conversation.
0
20
1/0 13
v) YouTube video
b) Explain TCP state transition diagram? [6]
0
7/2
.23 GP
c) Define Socket? Explain Socket primitives at client and server side for
TCP communication with diagram. [6]
E
82
8
C
23
OR
ic-
16
tat
8.2
6s
b) What causes silly window syndrome? How is avoided? Explain. [6]
.24
1:5
c) Following is a dump of UDP header in Hexadecimal format [6]
91
49
8:5
06 32 00 0D 00 1C E2 17
30
20
8
23
.23
tat
8.2
Q5) a) What is the difference between persistent & non persistent HTTP? Explain
6s
1:5
91
49
8:5
30
OR
1/0
CE
b) Explain FTP w.r.t. control and data connection? Explain any two FTP
.23
commands. [6]
16
c) When web pages containing emails are sent out, they are prefixed by
8.2
[5870] - 1128 2
Q7) a) Draw and explain Operational Model of Network Security. [5]
8
23
b) Discuss the working of IPSec? What are the different security services
ic-
offered by IPSec? [6]
tat
6s
c) Differentiate between Active attacks and Passive Attacks. [6]
1:5
02 91
8:5
0
OR
20
1/0 13
0
7/2
.23 GP
8
C
23
c) Explain Secure Socket Layer handshake Protocol. [6]
ic-
16
tat
8.2
6s
.24
1:5
91
49
8:5
30
20
01
02
7/2
GP
1/0
CE
82
8
23
.23
ic-
16
tat
8.2
6s
.24
1:5
91
49
8:5
30
20
01
02
7/2
GP
1/0
CE
82
.23
16
8.2
.24
49
[5870] - 1128 3